https://www.europesays.com/2283420/ How Air Force, Space Force secure ‘ubiquitous communications’ #AaronBishop #AirForce #mattermost #space #SpaceForce #ZeroTrust
https://www.europesays.com/2283420/ How Air Force, Space Force secure ‘ubiquitous communications’ #AaronBishop #AirForce #mattermost #space #SpaceForce #ZeroTrust
OuttaTune — The Microsoft Intune Conditional Access bypass I reported is now officially closed by MSRC (again).
It began as “By Design”… then was reclassified as a Moderate severity vulnerability… led to a product group meeting… and ultimately forced Microsoft to revise their official Conditional Access guidance.
Yet now it’s closed - with no fix timeline, no CVE, and no researcher credit.
Let’s unpack it.
⸻
The Issue
Intune lets you apply Conditional Access policies using device filters - say, “block access to Office 365 from DevBox VMs.”
But that device model? It’s just a registry key.
A local admin can change one line, sync the device, and suddenly it’s not a DevBox anymore. It’s “Compliant.” It’s trusted. It’s in.
⸻
Microsoft’s Initial Response
“This is by design.”
“Assignment filters should be used sparingly.”
“Intune cannot accurately lock down a device if an admin on the machine is actively working against management.”
Wait - imagine Microsoft saying that about Defender for Endpoint:
“Sorry, if someone has admin, Defender just gives up.”
Of course they wouldn’t say that. Because security controls must assume hostile actors. Why should Intune be any different?
⸻
The Outcome
• I pushed back, published my findings, and spoke directly with Microsoft’s product teams.
• They reclassified the issue as a Moderate security vulnerability.
• They changed official documentation to warn against using properties like device.model in isolation.
“Microsoft recommends using at least one system defined or admin configurable device property…”
That change exists because of this research.
⸻
But the Case Is Now Closed
MSRC insists that:
“This requires admin and knowledge of policy filters, so it remains Moderate.”
But attackers don’t need to know your exact filters - they can just trial different registry values and sync until they’re in. No alerts. No resistance. No risk of detection unless you’ve layered in custom EDR rules.
And admin access is table stakes. We can’t keep pretending that post-exploitation scenarios don’t matter.
⸻
Final Thoughts
Conditional Access isn’t just about who you are - it’s supposed to account for where and what you’re accessing from.
But when enforcement relies on unverified local data, the door isn’t locked. It’s not even shut.
We’ve just convinced ourselves that it is.
Trust nothing. Validate everything.
Even the registry keys your policies depend on.
⸻
Blog link: https://cirriustech.co.uk/blog/outtatune-vulnerability
Ok for some reason when I mentioned non-human identities and tracking them, a number of people assumed aliens or something, or just AI agents. What I am looking for are some insights into authentication actions on computer systems - using tokens, APIs, stored secrets, and so on - where a human is not directly involved in the interaction. Yes, AI could be involved, think MCP especially. I know there are tools out there to manage this, just wondering. Think using Okta SSO etc but not human users at all. Thoughts? Opinions? To me this is the next step in zero trust, in that one should have the same principles in place between any and all systems be they human or automated in that are they who or what they claim to be and are they authorized to do go forward and do what they are trying to do. #infosec #security #zerotrust
Open Gates to the AI Kingdom – The MCP Security Crisis
https://youtu.be/eogmjuWB9a4 #cybersecurity #AI #AgenticAI #MCP #DigitalRisk #ZeroTrust #DigitalResilience
1. CLOX sues Cognizant for $380M over VPN breach. SIGNAL: Security isn’t about firewalls — it’s about the person who answers the phone.
https://www.theregister.com/2023/09/19/the_clorox_company_admits_cyber
#Cognizant #Clorox #CyberSecurity #Infosec #ZeroTrust
When it comes to your critical networks, waiting isn’t an option.
Cyber threats move fast—your defense needs to move faster.
That’s where Zero-Wait Networks come in.
We’ve broken down 4 simple steps to help you protect what matters most—from smarter segmentation to real-time response.
Take a look at the graphic and see how a few key changes can make a big difference.
Because in cybersecurity, every second counts.
Is your network truly secure—or just wide open? Discover how network segmentation stops attackers in their tracks and keeps your business running smoothly.
Delivered with zero trust. And zero drama.
Check Point leads in #SASE security and user experience! In Miercom's latest assessment of top vendors, Check Point Harmony SASE came out on top across 10 real-world use cases.
Our highlights: Best-in-class Zero Trust & ZTNA
Fastest browsing & downloads for remote users
99% web threat prevention
Highest-rated admin & user experience
Signed. Harmony SASE’d. Delivered.
99% of IT/security pros want to redesign their access setup. Why?
VPNs are clunky. Identity is half-baked. Workarounds are everywhere.
New report from Tailscale reveals what’s broken—and what’s next.
https://tailscale.com/resources/report/zero-trust-report-2025?utm_source=Mastodon&utm_medium=owned-social&utm_campaign=zero-trust-survey-2025
#ZeroTrust #CyberSecurity #ZTNA
First working Redis with post-quantum mTLS using Falcon (NIST finalist) — running in a hardened Alpine container with OpenSSL 3.3.4 + oqs-provider.
Falcon keys + certs generated inside the image, Redis launched via --tls-port, and PONGs confirmed via PQ mTLS.
GitHub: https://github.com/zenthracore/zen.redis
Docker: https://hub.docker.com/r/zenthracore/zen.redis
This might be the first public Redis instance running on PQ crypto.
Assessing the Role of AI in Zero Trust
https://thehackernews.com/2025/07/assessing-role-of-ai-in-zero-trust.html
IT Essentials: AI agents – a licence to underwhelm
Whether ‘secret’ or ‘AI’, agents need trust to do their job For all the fanfare, AI agents are…
#NewsBeep #News #US #USA #UnitedStates #UnitedStatesOfAmerica #Computing #Artificialintelligence #CIO #CISO #EDITORIAL #GenAI #Google #GoogleCloud #Technology #ZeroTrust
https://www.newsbeep.com/us/25835/
In this #InfoQ #virtualpanel, security experts discuss designing for defense & architecting #APIs with #ZeroTrust principles. Understand Zero Trust concepts
Learn about common API vulnerabilities
Hear how developers are tackling real-world security challenges
Watch now: https://bit.ly/4eVVn56
#transcript included
@piraten @heiseonline Die Amis haben sich halt selber in diese #zerotrust Situation manövriert! #unplugusa
Salt Typhoon , a People’s Republic of China (PRC) state-backed cyber attack group is accelerating efforts to probe weaknesses in U.S. cyber infrastructure, while the US Administration dithers and is actively undermining U.S.Cyber Defenses. Examples:
1) FY26 budget includes a $177.4M cut to CISA’s “Cyber Operations,” including its Threat Hunting team which provides technical support to local governments and critical infrastructure operators.
2) FY26 budget includes a $14M cut to the Joint Cyber Defense Collaborative (JCDC), a hub for cyber threat intelligence and coordinating public-private cyber incident responses.
3) June 6 EO removed requirements for federal software vendors to submit proof that their products met secure development standards.
The Homeland Security Secretary recently testified that the administration “still [does not] necessarily know how to stop the next Salt Typhoon.” WIKES! https://www.justsecurity.org/116896/what-it-takes-stop-next-salt-typhoon/ #CyberSecurity #SaltTyphoon #CyberEspionage #Hackers #Security #ZeroTrust
Thousands of screens. Dozens of firewalls. One solution.
DEEL Media built a remote support workflow that just works — with Tailscale.
Secure
Instant
Scalable
How they did it: https://tailscale.com/customers/deel-media
#RemoteAccess #ZeroTrust #Tailscale #DigitalSignage
Palo Alto Networks Extends Zero-Trust Alliance with Okta – Source: securityboulevard.com https://ciso2ciso.com/palo-alto-networks-extends-zero-trust-alliance-with-okta-source-securityboulevard-com/ #SecurityBoulevard(Original) #rssfeedpostgeneratorecho #CyberSecurityNews #SecurityAwareness #SecurityBoulevard #secureendpoints #SocialFacebook #SocialLinkedIn #Cybersecurity #Spotlight #zerotrust #FEATURED #SocialX #News
KT Corp. will invest over 1 trillion won ($845 million) in information security over five years, enhancing AI-based monitoring, zero-trust frameworks, and DDoS defenses to strengthen customer data protection and prevent cybercrime losses.
#YonhapInfomax #KTCorp #InformationSecurity #AIMonitoring #ZeroTrust #DDoSDefense #Economics #FinancialMarkets #Banking #Securities #Bonds #StockMarket
https://en.infomaxai.com/news/articleView.html?idxno=72083
: Root AI Assistant
Maximize performance. Cut downtime.
RootV3 is your AI-powered system optimizer. https://wardenshield.com/root-ai-assistant-
#aitools #SystemOptimizer #rootv3 #AI #Cybersecurity #vulnerabilityassessment #endpointsecurity #SystemPerformance #SystemOptimization #ZeroTrust #technicalsupport
Spotlight: ThreatLocker has partnered with TWiT for over a year, delivering Zero Trust solutions that empower IT professionals. “It’s been natural & rewarding,” says David Coovert. Take back control—start your free 30-day trial at https://threatlocker.com/twit
Read more: https://twit.tv/posts/inside-twit/sponsor-spotlight-threatlocker
#ZeroTrust #Cybersecurity #Sponsor